期刊文献+

基于区块链的外包安全多方统计计算可验证隐私保护方案

Blockchain-based Outsourcing Secure Multi-party Statistical Computation Verifiable Privacy Protection Scheme
下载PDF
导出
摘要 安全多方求和/乘积是安全多方计算(Secure Multi-Party Computation, MPC)的一种典型问题,近年来在智能电网、电子投票和联合征信等场景中有诸多应用。如何实现数据隐私保护是安全多方求和/乘积计算应用领域的一个关键性问题。针对此问题,引入了区块链构建可信数据共享环境,以此为基础结合可验证秘密共享协议设计了简单可行的基于区块链的外包安全多方统计计算可验证隐私保护方案。应用实例证明了方案的安全性和可行性,理论分析和实验测试表明该方案可实现安全多方统计计算过程中数据的可验证隐私保护,且较Feldman方案在数据验证过程中有更小的计算开销。 Secure multi-party summation/product is a typical problem of Secure Multi-Party Computation(MPC),which has been widely applied in smart power grid,electronic voting,joint credit investigation and other scenarios in recent years.How to protect data privacy is a key problem in secure multi-party summation/product computation applications.In order to solve this problem,the blockchain is introduced to build a trusted data sharing environment.Based on this,combined with verifiable secret sharing protocol,a simple and feasible privacy protection scheme for outsourced secure multi-party statistical computing based on blockchain is designed.The security and feasibility of the scheme are proved by the application example.Theoretical analysis and experimental tests show that the scheme can realize the verifiable privacy protection of data in the secure multi-party statistical computation process,and has lower computational overhead than that of Feldman scheme in the data verification process.
作者 夏虎 田雯 高建彬 张天义 高然 夏琦 XIA Hu;TIAN Wen;GAO Jianbin;ZHANG Tianyi;GAO Ran;XIA Qi(School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu 611731,China)
出处 《无线电工程》 2024年第4期835-847,共13页 Radio Engineering
基金 国家自然科学基金(U22B2029) 四川省科技计划项目(2023JDRC0001) 基础加强计划技术领域基金项目(2021-JCJQ-JJ-0463)。
关键词 区块链 安全多方计算 智能合约 隐私保护 秘密共享 blockchain MPC smart contracts privacy protection secret sharing
  • 相关文献

参考文献6

二级参考文献181

  • 1BLAKLEY GR.Safeguarding cryptographic keys[A].Proceedings of the 1979 AFIPS National Computer Conference[C].AFIPS Press,1979,Vol 48:313 -317. 被引量:1
  • 2SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(1):612 -613. 被引量:1
  • 3ITO M,SAITO A,NISHIZCKI T.Secret sharing scheme realizing general access structure[A].Proceedings of IEEE Global Telecommunication Conference Globecom[C].1987,Vol 87:99-102. 被引量:1
  • 4BENALOH JC,LEICHTER J.Generalized secret sharing and monotone functions[A].Advances in Cryptology-CRYPTO'88[C].1990,LNCS 403:27 -35. 被引量:1
  • 5CHOR B,GOLDWASSER S,MICALI S,et al.Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults[A].Proceedings of IEEE FOCS'85[C].1985.383-395. 被引量:1
  • 6GOLDREICH O,MICALI S,WIGDERSON A.How to play any mental game[A].Proceeding of the Nineteenth annual ACM Symp[C].Theory of Computing,1987.218-229. 被引量:1
  • 7BEN-OR M,GOLDWASSER S,WIGDERSON A.Completeness theorems for non-cryptographic fault-tolerant distributed computation[A].ACM STOC[C].1988.1 -10. 被引量:1
  • 8RABIN T,BEN-OR M.Verifiable Secret Sharing and Multiparty Protocols with Honest Majority[A].ACM STOC[C].1989.73-85. 被引量:1
  • 9FELDMAN P.A Practical Scheme for Non-interactive Verifiable Secret Sharing[A].Proceedings of the 28 IEEE Symposium on Foundation of Computer Science(FOCS)[C].IEEE,1987.427-437. 被引量:1
  • 10PEDERSEN TP.Non-interactive and information-theoretic secure verifiable secret sharing[A].Advances in Cryptology-CRYPTO'91[C].Berlin:Springer,1991.129-140. 被引量:1

共引文献2500

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部